Wyniki wyszukiwania dla: CRYPTOGRAPHY PROTOCOLS - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: CRYPTOGRAPHY PROTOCOLS

Wyniki wyszukiwania dla: CRYPTOGRAPHY PROTOCOLS

  • Applications of semi-definite optimization in quantum information protocols

    Publikacja

    - Rok 2016

    This work is concerned with the issue of applications of the semi-definite programming (SDP) in the field of quantum information sci- ence. Our results of the analysis of certain quantum information protocols using this optimization technique are presented, and an implementation of a relevant numerical tool is introduced. The key method used is NPA discovered by Navascues et al. [Phys. Rev. Lett. 98, 010401 (2007)]. In chapter...

  • Jerzy Konorski dr hab. inż.

    Jerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...

  • Unconditional privacy over channels which cannot convey quantum information

    Publikacja
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • D. Leung
    • J. Oppenheim

    - PHYSICAL REVIEW LETTERS - Rok 2008

    Quantum cryptography enables one to verify that the state of the quantum system has not been tampered with and thus one can obtain privacy regardless of the power of the eavesdropper. All previous protocols relied on the ability to faithfully send quantum states or equivalently to share pure entanglement. Here we show this need not be the case-one can obtain verifiable privacy even through some channels which cannot be used to...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Multipartite secret key distillation and bound entanglement

    Publikacja

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable...

    Pełny tekst do pobrania w portalu

  • General paradigm for distilling classical key from quantum states

    Publikacja

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2009

    In this paper, we develop a formalism for distilling aclassical key from a quantum state in a systematic way, expandingon our previous work on a secure key from bound entanglement(Horodecki et al., 2005). More detailed proofs, discussion, andexamples are provided of the main results. Namely, we demonstratethat all quantum cryptographic protocols can be recast in away which looks like entanglement theory, with the only changebeing...

    Pełny tekst do pobrania w serwisie zewnętrznym